26
Drivers License Medical Financial Identity Theft is not just about Credit Cards! Click here to find out how you can protect yourself and your spouse from this growing crime! Social Security Character / Criminal Five Common Types of Identity Theft

Adrs Presentation Folder 051909

  • Upload
    julchap

  • View
    791

  • Download
    0

Embed Size (px)

DESCRIPTION

Identity Theft and Privacy- protect your company and employees

Citation preview

Page 1: Adrs Presentation Folder 051909

Drivers License

Medical Financial

Identity Theft is not just about Credit Cards!

Click here to find out how you can protect yourself and your spouse from this growing crime!

Social Security

Character/ Criminal

Five Common Types of Identity Theft

Page 2: Adrs Presentation Folder 051909

Affirmative DefenseResponse SystemSM

Why should all businesses, corporations, schools, financial institutions and hospitals be concerned about Identity Theft, FACTA, HIPAA, and GLB?

Answer: Liability, both civil and criminal.

Page 3: Adrs Presentation Folder 051909

Take Charge: Fighting BackAgainst Identity TheftOrder the Federal Trade Commission’s free report!

Phone: 877.IDTHEFTWeb: http://www.consumer.gov/idtheft

When you read this, it will become crystal clear why it is good for the company and the employee to have an ID Theft service that offers legal access, monitoring, and restoration versus resolution or reimbursement.

Page 4: Adrs Presentation Folder 051909

The Cost to Businesses

Employees can take up to 600 hours, mainly during business hours, to restore their identities

“If you experience a security breach, 20 percent of your affected customer base will no longer do business with you, 40 percent will consider ending the relationship, and 5 percent will be hiring lawyers!”*

“When it comes to cleaning up this mess, companies on average spend 1,600 work hours per incident at a cost of $40,000 to $92,000 per victim.”*

*CIO Magazine, The Coming Pandemic, Michael Freidenberg, May 15th, 2006

Page 5: Adrs Presentation Folder 051909

FACTA

HIPAA Security Rule

Gramm, Leach, Bliley Safeguard Rule

Individual State Laws (i.e. NJ / NY Whistle Blower Statute)

Important Legislation

Be Sure To Check With Your Attorney On How This Law May Specifically Apply To You

Page 6: Adrs Presentation Folder 051909

Applies To Every Business And Individual Who Maintains, Or Otherwise Possesses, Consumer Information For A Business Purpose.

Employee or Customer information lost under the wrong set of circumstances may cost your company: Federal and State Fines of $2500 per occurrence Civil Liability of $1000 per occurrence Class action Lawsuits with no statutory limitation Responsible for actual losses of Individual ($92,893 Avg.)

Fair and Accurate Credit Transactions Act (FACTA)

Be Sure To Check With Your Attorney On How This Law May Specifically Apply To You

Page 7: Adrs Presentation Folder 051909

HIPAA Security Rule

April 21, 2005 - Scope broadened on April 21, 2006

Applies To Any Organization Or Individuals Who Retain Or Collect Health Information.

Medical information lost under the wrong set of circumstances may result in: Fines up to $250,000 per occurrence Up to 10 Years Jail Time for Executives

Be Sure To Check With Your Attorney On How This Law May Specifically Apply To You

Page 8: Adrs Presentation Folder 051909

Eight Federal Agencies and any State can enforce this law

Applies To Any Organization That Maintains Personal Financial Information Regarding Its Clients Or Customers

Non Public Information (NPI) lost under the wrong set of circumstances may result in: Fines up to $1,000,000 per occurrence Up to 10 Years Jail Time for Executives Removal of management Executives within an organization can be held accountable for non-compliance both civilly and criminally

Gramm, Leach, Bliley Safeguard Rule

Be Sure To Check With Your Attorney On How This Law May Specifically Apply To You

Page 9: Adrs Presentation Folder 051909

Gramm, Leach, Bliley Safeguard RuleAny Organization Includes:Financial Institutions*

Schools

Credit Card Firms

Insurance Companies

Lenders

Brokers

Car Dealers

Accountants

Financial Planners

Real Estate Agents

*The FTC categorizes an impressive list of businesses as FI and these so-called “non-bank” businesses comprise a huge array of firms that may be unaware they are subject to GLB.

Be Sure To Check With Your Attorney On How This Law May Specifically Apply To You

Page 10: Adrs Presentation Folder 051909

Requires businesses to:

Appoint an Information Security Officer

Develop a written policy to protect NPI

Hold mandatory trainings for employees who have access to NPI

Safeguard and Security Rules

Be Sure To Check With Your Attorney On How This Law May Specifically Apply To You

Page 11: Adrs Presentation Folder 051909

Sensitive and Non Public Information Policy (First of four pages)

SENSITIVE and NON PUBLIC INFORMATION POLICY 1. PURPOSE The company adopts this policy to help protect employees, customers, contractors and the company from damages related to loss or misuse of sensitive information. This policy will:

Define sensitive information Describe the physical security of data when it is printed on paper Describe the electronic security of data when stored and distributed

2. SCOPE This policy applies to employees, contractors, consultants, temporaries, and other workers at the company, including all personnel affiliated with third parties. 3. POLICY

3.1. Definition of Sensitive Information Sensitive information includes the following items whether stored in electronic or printed format:

3.1.1. Personal Information - Sensitive information consists of personal information including,

but not limited to:

3.1.1.1. Credit Card Information, including any of the following: Credit Card Number (in part or whole) Credit Card Expiration Date Cardholder Name Cardholder Address

Page 12: Adrs Presentation Folder 051909

- “Stolen Lives”, ABA Journal, March 2006

Page 13: Adrs Presentation Folder 051909

“. . . all business should look to that law for guidance on how to protect consumer data. At a basic level, she says, that means businesses need to have a plan in writing describing how customer data is to be secured and an officer on staff responsible for implementing that plan.

Many large businesses entrust such planning and execution to a chief technical officer or chief privacy officer. Broder says she understands that most small businesses cannot be expected to hire a full-time privacy specialist, but she adds that all businesses must be able to show they have a security plan in place.

‘We’re not looking for a perfect system,’ Broder says. ‘But we need to see that you’ve taken reasonable steps to protect your customers’ information.’”

- “Stolen Lives”, ABA Journal, March 2006

Page 14: Adrs Presentation Folder 051909

The Best Answer

Pre-Paid Legal Services, Inc. is the only company

with a suite of services: Life Events Legal Plan, Legal

Shield and the Identity Theft Shield which provide

help in every phase of Identity Theft – before, during,

and after the crime occurs. The Affirmative Defense

Response SystemSM was developed to provide

businesses and their employees a way to minimize

their risk in regard to Identity Theft.

Page 15: Adrs Presentation Folder 051909

1. First Reasonable Step To Protect Customer’s Information As Outlined By The FTC

Why and How We Help You…

* Subject To Terms And Conditions

To All Employees [Company] RE: MANDATORY EMPLOYEE MEETING

PRIVACY AND SECURITY COMPLIANCE PROGRAM AND IDENTITY THEFT TRAINING

[insert date, time and location] On [insert date], [company] will host a mandatory employee meeting and training session on identity theft and privacy compliance. Additionally, as an employee, you will be provided an opportunity to purchase an identity theft product. As you know, [company] makes every effort to comply with all Federal Trade Commission guidelines to protect personal employee, customer and vendor information. As part of our security program, we want to train all employees on concrete steps to help reduce the risk of security breaches and identity theft. This program is important to [company] and your attendance is mandatory. I look forward to seeing each of you there on [date]. Sincerely, [Company] CEO

Page 16: Adrs Presentation Folder 051909

2. May Reduce Company Losses

Why and How We Help You…

The plan has Full Restoration*, which means the majority of the time in restoring an employee’s identity is covered by the membership and not done on company time and/or company expense. Also, use of our Life Events Legal Plan provides help* that address related issues.

* Subject To Terms And Conditions

Page 17: Adrs Presentation Folder 051909

3. Potential Early Warning System

If a number of your employees get notified of improper usage of their identities, this may act as an early warning system to your company of a possible internal breach.

Why and How We Help You…

Page 18: Adrs Presentation Folder 051909

4. BLR says this “Provides an Affirmative Defense for the company.”

Why and How We Help You…

“One solution that provides an affirmative defense against potential fines, fees, and lawsuits is to offer some sort of identity theft protection as an employee benefit. An employer can choose whether or not to pay for this benefit. The key is to make the protection available, and have a mandatory employee meeting on identity theft and the protection you are making available, similar to what most employers do for health insurance … Greg Roderick, CEO of Frontier Management, says that his employees "feel like the company's valuing them more, and it's very personal."

Business and Legal Reports, January 19, 2006

Page 19: Adrs Presentation Folder 051909

5. Mitigating Damages

Why and How We Help You…

Use of ConfidentialInformation by Employee

It makes Employees aware of their legal responsibilities to protect NPI

It serves as proof that handlers of NPI have been through the mandatory training required by law

To potentially protect yourself, you could have all employees sign this document…

Be Sure To Check With Your Attorney Before Using A Form Such As This

Page 20: Adrs Presentation Folder 051909

Acts as a Good Faith step in attempting to comply with FACTA, GLB, HIPAA, etc …

According to Betsy Broder of the FTC, “We will act against businesses that fail to protect their data … She understands that most small businesses cannot be expected to hire a full time privacy specialist but adds that all businesses must be able to show they have a security plan in place. “We’re not looking for a perfect system … But we need to see that you’ve taken reasonable steps to protect your customers’ information”.

ABA Journal, March 2006 – “Stolen Lives”

Employee Confidentiality Document

Be Sure To Check With Your Attorney Before Using A Form Such As This

Page 21: Adrs Presentation Folder 051909

Employers Offer Help Fighting ID TheftWall Street Journal, May 24, 2006

“As Identity Theft continues to claim millions of victims, a growing number of employers are offering to help affected workers pick up the pieces.

Companies including drugstore chain Rite Aid Corp., publisher Reed Elsevier PLC, and Quest Communications International Inc. have recently been signing up for identity-theft resolution services to offer their employees as a workplace benefit. The companies say the service can reduce the time employees spend during work hours filing reports and talking with creditors to resolve the problems created by identity theft. Providers of the services say they help victims clear their name, restore their credit and prevent future problems.

A recent survey of human-resources managers conducted by Aon Consulting, a unit of Aon Corp., found that 2% of employers currently offer identity-theft services as a workplace benefit, and a further 4.6% said they expected to offer it in the near future. Security and insurance experts say the interest also stems from concern among employers that they might face liability for personal data they have put at risk. By offering employees recovery assistance, companies hope to head off possible lawsuits, these experts say.

The heightened attention comes as disclosures of personal-date security breaches, which can lead to the crime of identity theft have soared. This week, the Department of Veterans Affairs said personal data - - including Social Security numbers - - on 26.5 million veterans and some of their spouses were stolen this month, although there isn’t any evidence they have yet become victims of financial fraud. The lapse brings to more than 80 million the number of identities since early 2005 that have been put at risk through such data breaches, according to Privacy Rights Clearinghouse, a non-profit advocacy group.”

Page 22: Adrs Presentation Folder 051909

Identity Theft: The Next Corporate Liability Wave Corporate Counsel, March 30, 2005

“Your phone rings. It’s Special Agent Bert Ranta. The FBI is investigating a crime ring involved in widespread identity theft. It has led to millions of dollars of credit card and loan losses for lenders, and havoc in the lives of the 10,000 victims. By identifying links between the victims, the FBI has discovered where the personal data appear to have come from: your company. The victims are some of your customers.

Your mind begins to whirr. Are there other customers affected who haven’t been identified yet? Is it a hacker or an inside job? Is your company also a victim here, or could it be on the wrong end of a class action lawsuit?

You recall reading that each identity theft victim will on average spend $1,495, excluding attorney’s fees, and 600 hours of their time to straighten out the mess, typically over the course of a couple of years. For out-of-pocket costs alone that is, say, $2,000 per victim. Multiplying that by 10,000 customer victims equals $20 million. Adding as little as $15 per hour for the victims’ time and you get $11,000 per case or a total of $110 million in total even before fines and punitive damages are considered. And that’s on top of the potential impact on your company’s future sales.

The nation’s fastest growing crime, identity theft, is combining with greater corporate accumulation of personal data, increasingly vocal consumer anger and new state and federal laws to create significant new legal, financial and reputation risks for many companies.”

Page 23: Adrs Presentation Folder 051909

Corporate Board Member July/August 2006

Page 24: Adrs Presentation Folder 051909

Be Sure To Check With Your Attorney On How This Law May Specifically Apply To You

1. Get a firm understanding of the Important Legislation we talked about today.

A great site with a tremendous amount of information is the FTC PUBS index: http://www.ftc.gov/bcp/conline/pubs/

FACTA: www.ftc.gov/os/2004/11/041118disposalfrn.pdf

HIPAA: www.hipaa.org

Gramm-Leach-Bliley Act: www.ftc.gov/os/2002/05/67fr36585.pdf

Two great resources for white papers: www.omnirim.com www.recall.com

Page 25: Adrs Presentation Folder 051909

Be Sure To Check With Your Attorney On How This Law May Specifically Apply To You

2. Take the first reasonable step as outlined by the FTC and schedule mandatory meetings regarding identity theft for your employees

3. Based on provisions in HIPAA and Gramm-Leach-Bliley, appoint an Information Security Officer.

4. Make sure “Good Faith” measures are in process. Confirm in writing, keep and put in employee file for your protection.

5. Review Employee Confidentiality Form and everything else you have questions on with your counsel.

6. You may want to review the recent publication from the Better Business Bureau: www.bbb.org/securityandprivacy/download.asp

7. When would you like us to begin working with your staff and/or employees?

Page 26: Adrs Presentation Folder 051909

Disclaimer1. The laws discussed in this presentation are, like

most laws, constantly amended and interpreted through legal and social challenges. You are encouraged to review the laws and draw your own conclusions through independent research.

2. The instructor is not an attorney, and the information provided is not to be taken as legal advice.

Be Sure To Check With Your Attorney On How This Law May Specifically Apply To You